Invisible Man - Tool is used for keeping private information and its later restoring. The Eraser - Tool is used for cleaning the private information kept on your computer. The program includes tools: Encrypted Disk - Tool is used for creating encrypted disks on your computer.
110. Ejobs Reporter
Ejobs Reporter simplifies the data capture process through a straight forward cut, paste, and pointing approach used in every major word processor. EJR solves the problem of staying on top of job searches using the Web. Then the information can be sorted and made part of daily reports which provide all the information needed to make the right contacts and present the best case for employment. DetailsDownload trialBuy now ($35.00) Find similar
Platform: Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Strategic Relationship Applications, Inc.
111. Full Convert Enterprise
Full Convert uses native access to databases wherever possible for maximum speed and reliability. Next time you want to convert, all you have to do is press a button and all your actions are executed after conversion over new data and with no additional work from your side. DetailsBuy now ($249.00) Find similar
Vendor: Spectral Core
Safe'n'Sec effectively protects computers against hacker attacks that exploit vulnerabilities existing in the Windows OS and sophisticated software to break the system integrity, access user data, execute malicious code, etc. Safe'n'Sec monitors all file operations, changes in the system registry, the status of OS processes, etc.
115. Full Convert Professional MySQL Edition
Full Convert uses native access to databases wherever possible for maximum speed and reliability. Next time you want to convert, all you have to do is press a button and all your actions are executed after conversion over new data and with no additional work from your side. DetailsBuy now ($99.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: Spectral Core
116. PWVault - A Password Generator, Repository and Login Assistant
Either don't use a challenge question & response or use another good password. Unique - Use a different password on every system. Easy to use. Never use any of these in reverse. Easy to use - People abbreviate these principles because memory is not perfect. DetailsDownload trialBuy now ($9.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Microcomputing
117. Full Convert Standard SQL Server Edition
Full Convert uses native access to databases wherever possible for maximum speed and reliability. Next time you want to convert, all you have to do is press a button and all your actions are executed after conversion over new data and with no additional work from your side. DetailsBuy now ($49.00) Find similar
Vendor: Spectral Core
Safe'n'Sec effectively protects computers against hacker attacks that exploit vulnerabilities existing in the Windows OS and sophisticated software to break the system integrity, access user data, execute malicious code, etc. Safe'n'Sec monitors all file operations, changes in the system registry, the status of OS processes, etc.
125. Splittur
In the most cases such custom-stub packages will even retain their stubs' functionality: JPG files will be pictures, RTF files will be text; only their size will grow. Another advantage is that all package files can be of virtually any format: EXE (self-extracting), RTF, JPG or any other depending on the stub you use, such packages will only need the freely available Weldur utility to get extracted. DetailsDownload trialBuy now ($29.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Stratopoint Software